Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Synology Fixes Critical BeeStation Zero-Day Exploited at Pwn2Own Ireland




Synology Fixes Critical BeeStation Zero-Day Exploited at Pwn2Own Ireland

A critical-severity RCE vulnerability in Synology's BeeStation products was demonstrated at the recent Pwn2Own Ireland 2025 hacking competition. Researchers Tek and anyfun earned $40,000 for successfully exploiting the bug. To address this issue, Synology released patches for affected versions of BeeStation OS, providing updated software that mitigates the risk associated with this vulnerability.



  • Synology has addressed a critical-severity remote code execution (RCE) vulnerability in its BeeStation products.
  • The vulnerability, CVE-2025-12686, allows attackers to execute arbitrary code and compromise the security of Synology's consumer-oriented NAS devices.
  • Pwn2Own Ireland 2025 researchers Tek and anyfun successfully demonstrated the exploitation of this vulnerability, earning a $40,000 reward from the Zero Day Initiative (ZDI).
  • Synology released patches for affected versions of BeeStation OS to mitigate the risk associated with this issue.



  • Synology, a leading manufacturer of network-attached storage (NAS) devices, has recently addressed a critical-severity remote code execution (RCE) vulnerability in its BeeStation products. The security issue, designated as CVE-2025-12686, was demonstrated by researchers Tek and anyfun from French cybersecurity company Synacktiv at the recent Pwn2Own Ireland 2025 hacking competition on October 21st.

    The vulnerability, categorized as a buffer copy without checking the size of input problem, allows attackers to execute arbitrary code, compromising the security of Synology's consumer-oriented NAS devices. BeeStation OS versions prior to version 1.3.2-65648 are reportedly impacted by this flaw, which can be exploited to facilitate a wide range of malicious activities.

    Researchers Tek and anyfun, representing French cybersecurity company Synacktiv, successfully demonstrated the exploitation of this vulnerability during the Pwn2Own Ireland event. Their successful demonstration earned them a $40,000 reward from the Zero Day Initiative (ZDI), a key organization behind the annual hacking competition.

    Pwn2Own, an event organized by Trend Micro and ZDI, provides security researchers with the opportunity to hack popular consumer devices using zero-day vulnerabilities. The most recent Pwn2Own Ireland 2025 event saw over 70 zero-day flaws identified across a broad range of products, resulting in more than $1 million awarded to researchers.

    The exploitation of this critical-severity vulnerability highlights the importance of timely patching and updating software components to prevent potential security breaches. Synology's proactive response to address this issue demonstrates its commitment to protecting user data and maintaining the trustworthiness of its NAS devices.

    Researchers Tek and anyfun exploited the bug in BeeStation OS, showcasing the severity of this vulnerability. These two researchers, representing French cybersecurity company Synacktiv, demonstrated how a critical-severity RCE vulnerability can be utilized by attackers to gain unauthorized access into Synology's consumer-oriented NAS devices.

    This exploit was demonstrated during the Pwn2Own Ireland 2025 competition on October 21st. The successful demonstration earned researchers Tek and anyfun $40,000 from the Zero Day Initiative (ZDI).

    The ZDI has a disclosure agreement with participating companies in this annual event. It agrees not to publish technical details about security issues until updates are available, ensuring users have enough time to apply patches.

    Following their successful demonstration of this critical vulnerability, Synology released patches for the affected versions of BeeStation OS. The patches address the vulnerability, providing updated versions of the software that mitigate the risk associated with this issue.

    To ensure the continued security and reliability of its consumer-oriented NAS devices, Synology has released a list of compatible version numbers that users can upgrade to. By applying these updates, users can safeguard their data against potential exploitation by attackers who could utilize this critical-severity vulnerability.

    In light of this incident, researchers emphasize the significance of conducting regular software patching and updating processes to maintain device security. This proactive approach enables organizations and individuals to stay informed about emerging vulnerabilities and take necessary precautions to protect themselves against malicious activities.

    The recent Pwn2Own Ireland 2025 competition highlights the importance of vigilance in addressing zero-day vulnerabilities. As technology advances, it becomes increasingly difficult to predict when and where these types of vulnerabilities will emerge.

    Synology's swift response to this critical-severity vulnerability demonstrates its commitment to maintaining user trust and data security. The company's proactive approach underscores the value placed on protecting consumer-oriented NAS devices from potential exploitation by attackers who could utilize zero-day vulnerabilities like CVE-2025-12686.

    In conclusion, Synology has taken significant steps to address a critical RCE vulnerability in its BeeStation products, as demonstrated at Pwn2Own Ireland 2025. By releasing patches for affected versions and providing updated software that mitigates this risk, the company demonstrates its commitment to protecting user data and maintaining device security.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Synology-Fixes-Critical-BeeStation-Zero-Day-Exploited-at-Pwn2Own-Ireland-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/synology-fixes-beestation-zero-days-demoed-at-pwn2own-ireland/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-12686

  • https://www.cvedetails.com/cve/CVE-2025-12686/

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/

  • https://www.reddit.com/r/AskIreland/comments/15lur9e/email_scam_what_is_an_apt_hacking_group/


  • Published: Tue Nov 11 16:42:30 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us